CVE-2022-26134

Atlassian Confluence vulnerability

CVE-2022-26134
Adam Cassar

Co-Founder

1 min read

On June 2, 2022 Volexity announced active exploitation of Atlassian Confluence. An active Remote Code Execution via OGNL injection CVE-2022-26134 and impacts all versions of Confluence Server and Data Center versions greater than 1.3.0.

Atlassian has released their security advisory with patches and mitigation instructions supplied.

Peakhour WAF clients are already protected. We have observed a 200% increase of OGNL based exploit attempts since the announcement of the vulnerability on June 2nd.

Discover how Peakhour's Web Application Firewall provides proactive protection against zero-day vulnerabilities like CVE-2022-26134. Contact our team to secure your applications.

Enterprise-Grade Security and Performance

Peakhour offers enterprise-grade security to shield your applications from DDoS attacks, bots, and online fraud, while our global CDN ensures optimal performance.

Contact Us

Related Content

Agentic AI vs. Your API

Agentic AI vs. Your API

Understand the shift from scripted bots to reasoning AI agents and how to adapt your security strategy for this new reality.

Beyond the IP Address

Beyond the IP Address

Discover why traditional IP-based rate limiting is obsolete and how advanced techniques provide robust protection against modern distributed attacks.

Key Considerations for Effective Bot Management

Key Considerations for Effective Bot Management

With nearly half of all internet traffic being automated, a robust bot management strategy is essential. This article explores the key considerations for effective bot detection, classification, and response in the face of evolving threats.

The Bot Spectrum

The Bot Spectrum

Learn to classify bots into good, bad, and grey categories and apply the right management strategy for each.

How to Use Bot Management for IAM Use Cases

How to Use Bot Management for IAM Use Cases

Bots are used in both security and nonsecurity attacks. Identity and access management leaders must build a strong business case for a bot management capability or their organizations will incur avoidable losses due to account takeovers and also be unprepared to manage the risks introduced by customers using AI agents.

How AI Agents Are Writing Custom Exploits

How AI Agents Are Writing Custom Exploits

AI agents with reasoning capabilities like DeepSeek are revolutionizing exploit development, marking the end of traditional security approaches based on static rules and patterns.

© PEAKHOUR.IO PTY LTD 2025   ABN 76 619 930 826    All rights reserved.